Abstract
The irreversible trend in clustering of mining power raises severe concerns on stability and security of PoW based on cryptocurrency. It has been shown that, in some case, reward of a mining pool can be significantly increased by deviating honest mining strategy. As a result, many attacking strategies are proposed to maximize pools’ reward. Very recently, Kwon et. al. proposed Fork After Withholding (FAW) attack by combining selfish mining and Block Withholding (BWH) attack, which, as they stated, has a better reward than BWH. However, it is not always the case after our further investigation. In this paper, we firstly give a detailed comparation between the BWH and FAW attack, and show the implications behind them. We also consider honest mining to make the analysis of the block reward more clear. We demonstrate the imperfection of FAW in relative reward, reward after the fork and the fork state. Our main finding for FAW attack includes that the reward of victim pool increases faster compared to BWH attack, and for some cases, the attack should adopt honest mining strategy to maximize its reward, therefore, we present an improved FAW strategy, and propose a protocol for the pool’s manager to resist FAW’s attacker. Finally, we discuss the underlying flaws of FAW attack as well as countermeasures to alleviate it.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Similar content being viewed by others
References
Block explorer. http://qukuai.com. Accessed 21 Dec 2017
Litecoin: The cryptocurrency for payments based on blockchain technology. https://litecoin.org/. Accessed 13 Dec 2017
Gervais, A., Karame, G.O., Wüst, K., Glykantzis, V., Ritzdorf, H., Capkun, S.: On the security and performance of proof of work blockchains. In: ACM SIGSAC Conference on Computer and Communications Security, pp. 3–16. ACM (2016)
Sapirshtein, A., Sompolinsky, Y., Zohar, A.: Optimal selfish mining strategies in bitcoin. In: Grossklags, J., Preneel, B. (eds.) FC 2016. LNCS, vol. 9603, pp. 515–532. Springer, Heidelberg (2017). https://doi.org/10.1007/978-3-662-54970-4_30
Tschorsch, F., Scheuermann, B.: Bitcoin and beyond: a technical survey on decentralized digital currencies. IEEE Commun. Surv. Tutor. 18(3), 2084–2123 (2016). https://doi.org/10.1109/COMST.2016.2535718
Gavin, W.: Ethereum: a secure decentralised generalised transaction ledger. Ethereum Project Yellow Paper 151, 1–32 (2014)
Eyal, I.: The miner’s dilemma. In: IEEE Symposium on Security and Privacy, pp. 89–103. IEEE (2015)
Eyal, I., Sirer, E.G.: Majority is not enough: bitcoin mining is vulnerable. Commun. ACM 61(7), 95–102 (2018). https://doi.org/10.1145/3212998
Bonneau, J., Miller, A., Clark, J., Narayanan, A., Kroll, J.A., Felten, E.W.: SoK: research perspectives and challenges for bitcoin and cryptocurrencies. In: IEEE Symposium on Security and Privacy, pp. 104–121. IEEE (2015)
Luu, L., Saha, R., Parameshwaran, I., Saxena, P., Hobor, A.: On power splitting games in distributed computation: the case of bitcoin pooled mining. In: IEEE Computer Security Foundations Symposium, pp. 397–411. IEEE (2015)
Madeira, A.: What is bitcoin selfish mining? https://www.cryptocompare.com/coins/guides/what-is-bitcoin-selfish-mining/. Accessed 12 Jan 2018
Bag, S., Ruj, S., Sakurai, K.: Bitcoin block withholding attack: analysis and mitigation. IEEE Trans. Inf. Forensics Secur. 12, 1967–1978 (2017). https://doi.org/10.1109/TIFS.2016.2623588
Nakamoto, S.: Bitcoin: a peer-to-peer electronic cash system (2008)
Courtois, N.T., Bahack, L.: On subversive miner strategies and block withholding attack in bitcoin digital currency. arXiv preprint arXiv:1402.1718 (2014)
Kwon, Y., Kim, D., Son, Y., Vasserman, E., Kim, Y.: Be selfish and avoid dilemmas: Fork After Withholding (FAW) attacks on bitcoin. In: ACMSIGSAC Conference on Computer and Communications Security, pp. 195–209. ACM (2017)
Acknowledgments
This work is supported by the National Natural Science Foundation of China under grant No. 61572294, No. 61602287, Key Program of National Natural Science of China under grant No. 61632020, Natural Science Foundation of Shandong Province under grant No. ZR2017MF021, the Primary Research & Development Plan of Shandong Province (No. 2018GGX101037), and the Fundamental Research Funds of Shandong University under grant No. 2017JC019.
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2018 Springer Nature Switzerland AG
About this paper
Cite this paper
Ke, J., Jiang, H., Song, X., Zhao, S., Wang, H., Xu, Q. (2018). Analysis on the Block Reward of Fork After Withholding (FAW). In: Au, M., et al. Network and System Security. NSS 2018. Lecture Notes in Computer Science(), vol 11058. Springer, Cham. https://doi.org/10.1007/978-3-030-02744-5_2
Download citation
DOI: https://doi.org/10.1007/978-3-030-02744-5_2
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-030-02743-8
Online ISBN: 978-3-030-02744-5
eBook Packages: Computer ScienceComputer Science (R0)